Given the above information, which of the following steps should be performed NEXT to secure the system?

Posted by: Pdfprep Category: CS0-001 Tags: , ,

A security analyst is reviewing the following log after enabling key-based authentication.

Given the above information, which of the following steps should be performed NEXT to secure the system?
A . Disable anonymous SSH logins.
B . Disable password authentication for SS
D . Disable SSHv1.
E . Disable remote root SSH logins.

Answer: B

Leave a Reply

Your email address will not be published.